CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Ubuntu Security Notification for Linux Vulnerabilities (USN-3055-1)——漏洞银行丨0DAY BANK

2016年8月16日 1875点热度 0人点赞 0条评论

漏洞信息

An integer overflow in the Linux netfilter implementation.

It was discovered that the keyring implementation in the Linux kernel did not ensure a data structure was initialized before referencing it after an error condition occurred.

A use-after-free existed in the percpu allocator in the Linux kernel.

An information leak in the netlink implementation of the Linux kernel.

漏洞危害

On systems running 32 bit kernels, a local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-3135)

A local attacker could use this to cause a denial of service (system crash). (CVE-2016-4470)

A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-4794)

A local attacker could use this to obtain sensitive information from kernel memory. (CVE-2016-5243)

解决方案

Refer to Ubuntu advisory USN-3055-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3055-1: 16.04 (Xenial) on src (linux-image-4.4.0-34-lowlatency)

USN-3055-1: 16.04 (Xenial) on src (linux-image-4.4.0-34-powerpc64-emb)

USN-3055-1: 16.04 (Xenial) on src (linux-image-4.4.0-34-generic-lpae)

USN-3055-1: 16.04 (Xenial) on src (linux-image-4.4.0-34-generic)

USN-3055-1: 16.04 (Xenial) on src (linux-image-4.4.0-34-powerpc64-smp)

USN-3055-1: 16.04 (Xenial) on src (linux-image-4.4.0-34-powerpc-e500mc)

USN-3055-1: 16.04 (Xenial) on src (linux-image-4.4.0-34-powerpc-smp)

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me